i am infosec Engineer and we detected an exploit in your Access_JDBC30.jar file in one of our clients , actually different antivirus product detected (JET4) as crafted .MDB file which attempts to exploit a vulnerability in Microsoft Jet Database Engine (Jet) that could allow remote code execution.
More information about the said vulnerability can be found in the following link:
Microsoft Security Advisory (950627)
Once successfully exploited, the said vulnerability could allow this Trojan to drop and execute an .EXE file detected by Trend Micro as TROJ_AGENT.AABE. As a result, routines of the dropped file may be exhibited on the affected machine.
check the following site:
and detected by Symantec as Bloodhound.Exploit.183
i already searched your support forum and found others ask about it as in:
but the answers were not enough we need more clarifications please !!!
It's still a wrong virus report. After we reported Avast that issue, it seems Avast doesn't report wrongly again.
Please check http://www.virustotal.com/analisis/617eb1c7b3ebb0c281bcead74eef95e1, you will see only
eSafe 220.127.116.11 2008.06.05 Suspicious Archive Structure
If you see
you will find that wrong report happened only when that same JET4 file is in a zip file, and disappear when it is scanned as a single file.